Year of publication
Subject
Type of material
Language
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
Adaptively Secure Constrained Pseudorandom Functions
Springer Verlag | 2019|Keywords: Systems and Data Security -
A Generic View on Trace-and-Revoke Broadcast Encryption Schemes
Springer Verlag | 2014|Keywords: Systems and Data Security -
Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography
Springer Verlag | 2015|Keywords: Systems and Data Security -
All-But-Many Lossy Trapdoor Functions
Free accessSpringer Verlag | 2012|Keywords: Systems and Data Security -
A Modular Analysis of the Fujisaki-Okamoto Transformation
Springer Verlag | 2017|Keywords: Systems and Data Security -
A technique of phase shift watermarking against overwriting attacks
Tema Archive | 1999|Keywords: Datensicherheit -
A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems
Free accessSpringer Verlag | 2010|Keywords: Systems and Data Security -
Bonsai Trees, or How to Delegate a Lattice Basis
Free accessSpringer Verlag | 2010|Keywords: Systems and Data Security -
Bounded CCA2-Secure Encryption
Free accessSpringer Verlag | 2007|Keywords: Systems and Data Security -
Bounded Key-Dependent Message Security
Free accessSpringer Verlag | 2010|Keywords: Systems and Data Security -
Circular Chosen-Ciphertext Security with Compact Ciphertexts
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Compact Structure-Preserving Signatures with Almost Tight Security
Springer Verlag | 2017|Keywords: Systems and Data Security -
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Free accessSpringer Verlag | 2010|Keywords: Systems and Data Security -
Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks
Free accessSpringer Verlag | 2014|Keywords: Systems and Data Security -
How to Generate and Use Universal Samplers
Springer Verlag | 2016|Keywords: Systems and Data Security -
Idealizing Identity-Based Encryption
Free accessSpringer Verlag | 2015|Keywords: Systems and Data Security -
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
Free accessSpringer Verlag | 2015|Keywords: Systems and Data Security -
Image coding for copyright protection by using wavelet
Tema Archive | 1997|Keywords: Datensicherheit -
Mobile agent security with the IPEditor development tool and the Mobile UNITY language
Tema Archive | 2002|Keywords: Datensicherheit -
Obfuscation for Cryptographic Purposes
Free accessSpringer Verlag | 2007|Keywords: Systems and Data Security -
On Definitions of Selective Opening Security
Free accessSpringer Verlag | 2012|Keywords: Systems and Data Security -
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
Springer Verlag | 2020|Keywords: Systems and Data Security -
On the Impossibility of Purely Algebraic Signatures
Springer Verlag | 2021|Keywords: Systems and Data Security -
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
Free accessSpringer Verlag | 2014|Keywords: Systems and Data Security -
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
Free accessSpringer Verlag | 2009|Keywords: Systems and Data Security -
Practical Chosen Ciphertext Secure Encryption from Factoring
Free accessSpringer Verlag | 2009|Keywords: Systems and Data Security -
Practical Signatures from Standard Assumptions
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Programmable Hash Functions and Their Applications
Springer Verlag | 2008|Keywords: Systems and Data Security -
Programmable Hash Functions in the Multilinear Setting
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Public-Key Encryption with Non-interactive Opening
Springer Verlag | 2008|Keywords: Systems and Data Security -
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Springer Verlag | 2016|Keywords: Systems and Data Security -
Reconfigurable Cryptography: A Flexible Approach to Long-Term Security
Springer Verlag | 2015|Keywords: Systems and Data Security -
Secure and efficient mobile agent application development using patterns
Tema Archive | 2003|Keywords: Datensicherheit -
Secure hybrid encryption from weakened key encapsulation
Tema Archive | 2007|Keywords: Datensicherheit -
Secure Hybrid Encryption from Weakened Key Encapsulation
Free accessSpringer Verlag | 2007|Keywords: Systems and Data Security -
Security patterns: a method for constructing secure and efficient inter-company coordination systems
Tema Archive | 2004|Keywords: Datensicherheit -
Short Signatures from Weaker Assumptions
Free accessSpringer Verlag | 2011|Keywords: Systems and Data Security -
Standard Security Does Not Imply Indistinguishability Under Selective Opening
Springer Verlag | 2016|Keywords: Systems and Data Security -
Standard versus Selective Opening Security: Separation and Equivalence Results
Free accessSpringer Verlag | 2014|Keywords: Systems and Data Security -
The Group of Signed Quadratic Residues and Applications
Free accessSpringer Verlag | 2009|Keywords: Systems and Data Security -
The Price of Verifiability: Lower Bounds for Verifiable Random Functions
Springer Verlag | 2022|Keywords: Systems and Data Security -
The Price of Verifiability: Lower Bounds for Verifiable Random Functions
TIBKAT | 2022|Keywords: Datensicherung -
Tightly CCA-Secure Encryption Without Pairings
Springer Verlag | 2016|Keywords: Systems and Data Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.